Hardware

Stack Redundancy to Thwart Return Oriented Programming in Embedded Systems

Hardware Security Evaluation Platform for MCU-Based Connected Devices: Application to Healthcare IoT

Key Reconciliation Protocols for Error Correction of Silicon PUF Responses

Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults?